• Title/Summary/Keyword: applications identification

Search Result 778, Processing Time 0.029 seconds

Developing an integrated software solution for active-sensing SHM

  • Overly, T.G.;Jacobs, L.D.;Farinholt, K.M.;Park, G.;Farrar, C.R.;Flynn, E.B.;Todd, M.D.
    • Smart Structures and Systems
    • /
    • v.5 no.4
    • /
    • pp.457-468
    • /
    • 2009
  • A novel approach for integrating active sensing data interrogation algorithms for structural health monitoring (SHM) applications is presented. These algorithms cover Lamb wave propagation, impedance methods, and sensor diagnostics. Contrary to most active-sensing SHM techniques, which utilize only a single signal processing method for damage identification, a suite of signal processing algorithms are employed and grouped into one package to improve the damage detection capability. A MATLAB-based user interface, referred to as HOPS, was created, which allows the analyst to configure the data acquisition system and display the results from each damage identification algorithm for side-by-side comparison. By grouping a suite of algorithms into one package, this study contributes to and enhances the visibility and interpretation of the active-sensing methods related to damage identification. This paper will discuss the detailed descriptions of the damage identification techniques employed in this software and outline future issues to realize the full potential of this software.

Analysis of Present Tendencies and Strategic Direction for the Development in RFID Industry (RFID의 현황분석 및 발전방향에 관한 연구)

  • Yang, Hee-Joong;Im, June-Men
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.4
    • /
    • pp.69-78
    • /
    • 2005
  • RFID is a technique that plays an important role in identifying and tracking the movement of objects by inserting small chips in objects. It is somewhat similar to bar codes from the various points of applications, but is hopefully considered to lead to tremendous development by solving the present drawbacks of bar codes such as slow identification. Speed, low rate of identification, limitation on the distance of identification and on the amount of saving capacity. Through the development of RFID technique, revolutionary growth is anticipated in the area of logistics and commodity distributional systems. Futhermore, the self processing RFID makes the communications between man and objects possible, and through which introduction of ubiquitous atmosphere will be accelerated. Therefore RFID is considered as one of the most attracting area of investment by developed countries as well as Korea. In this paper, we analyze the world wide tendency on RFID, and propose the conditions for activating RFID industry and also suggest directions for national strategy for diffusing RFID.

Behavior Based Signature Extraction Method for Internet Application Traffic Identification (인터넷 응용 트래픽 분석을 위한 행위기반 시그니쳐 추출 방법)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.368-376
    • /
    • 2013
  • The importance of application traffic identification is emphasized for the efficient network management with recent rapid development of internet. In this paper, we present the application traffic identification method using the behavior based signature to improve the previous limitations. The behavior based signature is made by combining the existing various traffic features, and uses the Inter-Flow unit that is combination of the first request packet of each flow. All signatures have 100% precision when measured the accuracy of 5 applications using at home and abroad to prove the feasibility of the proposed signature.

Guided Wave Mode Identification Using Wavelet Transform (웨이블릿 변환을 이용한 유도초음파의 모드 확인)

  • Ik-Keun Park
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.12 no.5
    • /
    • pp.94-100
    • /
    • 2003
  • One of unique characteristics of guided waves is a dispersive behavior that guided wave velocity changes with an excitation frequency and mode. In practical applications of guided wave techniques, it is very important to identify propagating modes in a time-domain waveform for determination of detect location and size. Mode identification can be done by measurement of group velocity in a time-domain waveform. Thus, it is preferred to generate a single or less dispersive mode But, in many cases, it is difficult to distinguish a mode clearly in a time-domain waveform because of superposition of multi modes and mode conversion phenomena. Time-frequency analysis is used as efficient methods to identify modes by presenting wave energy distribution in a time-frequency. In this study, experimental guided wave mode identification is carried out in a steel plate using time-frequency analysis methods such as wavelet transform. The results are compared with theoretically calculated group velocity dispersion own. The results are in good agreement with analytical predictions and show the effectiveness of using the wavelet transform method to identify and measure the amplitudes of individual guided wave modes.

An Efficient Tag Identification Algorithm using Bit Pattern Prediction Method (비트 패턴 예측 기법을 이용한 효율적인 태그 인식 알고리즘)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kwon, Kee-Koo;Ahn, Kwang-Seon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.5
    • /
    • pp.285-293
    • /
    • 2013
  • The procedure of the arbitration which is the tag collision is essential because the multiple tags response simultaneously in the same frequency to the request of the Reader. This procedure is known as Anti-collision and it is a key technology in the RFID system. In this paper, we propose the Bit Pattern Prediction Algorithm(BPPA) for the efficient identification of the multiple tags. The BPPA is based on the tree algorithm using the time slot and identify the tag quickly and efficiently using accurate bit pattern prediction method. Through mathematical performance analysis, We proved that the BPPA is an O(n) algorithm by analyzing the worst-case time complexity and the BPPA's performance is improved compared to existing algorithms. Through MATLAB simulation experiments, we verified that the BPPA require the average 1.2 times query per one tag identification and the BPPA ensure stable performance regardless of the number of the tags.

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

HHT method for system identification and damage detection: an experimental study

  • Zhou, Lily L.;Yan, Gang
    • Smart Structures and Systems
    • /
    • v.2 no.2
    • /
    • pp.141-154
    • /
    • 2006
  • Recently, the Hilbert-Huang transform (HHT) has gained considerable attention as a novel technique of signal processing, which shows promise for the system identification and damage detection of structures. This study investigates the effectiveness and accuracy of the HHT method for the system identification and damage detection of structures through a series of experiments. A multi-degree-of-freedom (MDOF) structural model has been constructed with modular members, and the columns of the model can be replaced or removed to simulate damages at different locations with different severities. The measured response data of the structure due to an impulse loading is first decomposed into modal responses using the empirical mode decomposition (EMD) approach with a band-pass filter technique. Then, the Hilbert transform is subsequently applied to each modal response to obtain the instantaneous amplitude and phase angle time histories. A linear least-square fit procedure is used to identify the natural frequencies and damping ratios from the instantaneous amplitude and phase angle for each modal response. When the responses at all degrees of freedom are measured, the mode shape and the physical mass, damping and stiffness matrices of the structure can be determined. Based on a comparison of the stiffness of each story unit prior to and after the damage, the damage locations and severities can be identified. Experimental results demonstrate that the HHT method yields quite accurate results for engineering applications, providing a promising tool for structural health monitoring.

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Application of DNA Microarray Technology to Molecular Microbial Ecology

  • Cho Jae-Chang
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2002.10a
    • /
    • pp.22-26
    • /
    • 2002
  • There are a number of ways in which environmental microbiology and microbial ecology will benefit from DNA micro array technology. These include community genome arrays, SSU rDNA arrays, environmental functional gene arrays, population biology arrays, and there are clearly more different applications of microarray technology that can be applied to relevant problems in environmental microbiology. Two types of the applications, bacterial identification chip and functional gene detection chip, will be presented. For the bacterial identification chip, a new approach employing random genome fragments that eliminates the disadvantages of traditional DNA-DNA hybridization is proposed to identify and type bacteria based on genomic DNA-DNA similarity. Bacterial genomes are fragmented randomly, and representative fragments are spotted on a glass slide and then hybridized to test genomes. Resulting hybridization profiles are used in statistical procedures to identify test strains. Second, the direct binding version of microarray with a different array design and hybridization scheme is proposed to quantify target genes in environmental samples. Reference DNA was employed to normalize variations in spot size and hybridization. The approach for designing quantitative microarrays and the inferred equation from this study provide a simple and convenient way to estimate the target gene concentration from the hybridization signal ratio.

  • PDF

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.